CVE-2007-4496
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
21/09/2007
Last modified:
09/04/2025
Description
Unspecified vulnerability in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528 allows authenticated users with administrative privileges on a guest operating system to corrupt memory and possibly execute arbitrary code on the host operating system via unspecified vectors.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:* | 1.0 (including) | 1.0.3 (including) |
cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:* | 2.0 (including) | 2.0.1 (including) |
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:* | 1.0.0 (including) | 1.0.5 (including) |
cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:* | 2.0 (including) | 2.0.1 (including) |
cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:* | 1.0 (including) | 1.0.4 (including) |
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* | 5 (including) | 5.5.5 (including) |
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* | 6.0 (including) | 6.0.1 (including) |
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
- http://secunia.com/advisories/26890
- http://secunia.com/advisories/27694
- http://secunia.com/advisories/27706
- http://security.gentoo.org/glsa/glsa-200711-23.xml
- http://www.securityfocus.com/bid/25728
- http://www.securitytracker.com/id?1018718=
- http://www.ubuntu.com/usn/usn-543-1
- http://www.vmware.com/support/ace/doc/releasenotes_ace.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/server/doc/releasenotes_server.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2007/3229
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
- http://secunia.com/advisories/26890
- http://secunia.com/advisories/27694
- http://secunia.com/advisories/27706
- http://security.gentoo.org/glsa/glsa-200711-23.xml
- http://www.securityfocus.com/bid/25728
- http://www.securitytracker.com/id?1018718=
- http://www.ubuntu.com/usn/usn-543-1
- http://www.vmware.com/support/ace/doc/releasenotes_ace.html
- http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html
- http://www.vmware.com/support/player/doc/releasenotes_player.html
- http://www.vmware.com/support/player2/doc/releasenotes_player2.html
- http://www.vmware.com/support/server/doc/releasenotes_server.html
- http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
- http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
- http://www.vupen.com/english/advisories/2007/3229